Filter design with secrecy constraints: Zero-forcing constraint at the legitimate receiver | IEEE Conference Publication | IEEE Xplore